-
801
Research on Audit Risk Prediction in Enterprise Management Based on Optimized BP Neural Network Algorithm
Published 2025-01-01“…After understanding the current research status of enterprise management audit risk prediction, this paper mainly discusses the risk assessment model of audit material misstatement based on the optimized B neural network algorithm based on the BP neural network algorithm and the basic concepts of enterprise audit work, and conducts verification and analysis based on practical cases, and finally proves that the prediction results of the model are effective and scientific, which is worthy of application in enterprise management.…”
Get full text
Article -
802
Homogeneity Test of Many-to-One Risk Differences for Correlated Binary Data under Optimal Algorithms
Published 2021-01-01“…In clinical studies, it is important to investigate the effectiveness of different therapeutic designs, especially, multiple treatment groups to one control group. The paper mainly studies homogeneity test of many-to-one risk differences from correlated binary data under optimal algorithms. …”
Get full text
Article -
803
Distributed Algorithm for Traffic Data Collection and Data Quality Analysis Based on Wireless Sensor Networks
Published 2011-09-01“…The growing need of the real-time traffic data has spurred the deployment of large-scale dedicated monitoring infrastructure systems, which mainly consist of the use of inductive loop detectors. …”
Get full text
Article -
804
Discrete multi-objective optimization of particle swarm optimizer algorithm for multi-agents collaborative planning
Published 2016-06-01“…Although multiple mobile agents(MA)collaboration can quickly and efficiently complete data aggregation in wireless sensor network,the MA carrying data packages extensively increase along with a raise in the number of data source nodes accessed by MA,which causes unbalanced energy load of sensor nodes,high energy consumption of partial source nodes,and shortened lifetime of networks.The existing related works mainly focus on the objective of decreasing total energy consumption of multiple MA,without considering that rapidly energy consumption of partial source nodes has a negative effect on networks lifetime.Therefore,discrete multi-objective optimization of particle swarm algorithm was proposed,which used the total network energy consumption and mobile agent load balancing as fitness function for the approximate optimal itinerary plan in multiple mobile agent collaboration.Furthermore,the simulation result of the proposed algorithm is better than the similar algorithm in total energy consumption and network lifetime.…”
Get full text
Article -
805
Fast Decomposition Algorithm Based on Two-Dimensional Wavelet Transform for Image Processing of Graphic Design
Published 2021-01-01“…In this paper, we propose a fast decomposition algorithm image processing method based on a new transform of the wavelet transform, which mainly addresses the problems of large computation of feature points and long-time consumption of traditional image processing algorithms. …”
Get full text
Article -
806
Adaptive Full-Duplex and Half-Duplex Power Line Relay and Power Optimization Allocation Algorithm
Published 2021-06-01“…In order to improve the long-distance communication capability, power line communication currently mainly adopts a two-slot half-duplex relay technology. …”
Get full text
Article -
807
Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D
Published 2021-04-01“…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
Get full text
Article -
808
BHT-QAOA: The Generalization of Quantum Approximate Optimization Algorithm to Solve Arbitrary Boolean Problems as Hamiltonians
Published 2024-10-01“…A new methodology is introduced to solve classical Boolean problems as Hamiltonians, using the quantum approximate optimization algorithm (QAOA). This methodology is termed the “Boolean-Hamiltonians Transform for QAOA” (BHT-QAOA). …”
Get full text
Article -
809
An adaptive differential evolution algorithm using fitness distance correlation and neighbourhood-based mutation strategy
Published 2022-12-01“…However, the DE algorithm mainly focuses on strengthening the adaptability of exploitation, which allows the sensitivity of the DE algorithm to be solved in cases where the effects of solving various types of problems are quite different. …”
Get full text
Article -
810
Relay selection algorithm based on selfish behavior analysis in ultra-dense D2D
Published 2021-04-01“…In ultra-dense D2D communication, the current relay selection schemes mainly assume that the relay device has the initiative to participate in data forwarding, but some rational relay devices may delay or refuse to forward due to their own considerations, thus affecting the user experience.From the perspective of selfish behavior of relay devices, a method to identify selfish relay devices in D2D communication was proposed, and then an ultra-dense D2D relay selection algorithm based on selfish behavior analysis was proposed.Firstly, three relay identification attribute factors, namely joint interest degree (JID), forwarding history ratio (FHR) and relay physical state (RPS) were defined, and their weights were calculated by triangular fuzzy function to identify relay devices with selfish behavior.Secondly, based on the TOPSIS (technique for order of preference by similarity to ideal solution) method, the final relay equipment selection scheme relay was realized.Simulation results show that the proposed algorithm can identify selfish relay devices more effectively in D2D communication.Compared with other relay selection algorithms, the proposed algorithm has made significant progress in the aspects of D2D communication forwarding success rate, system average throughput and average time delay.…”
Get full text
Article -
811
Optimization of Lattice-Based Cryptographic Key Generation using Genetic Algorithms for Post-Quantum Security
Published 2025-04-01“…However, practically implementing LBC is faced with key-generation and optimization difficulties, mainly because of its enormous key sizes and computational overhead. …”
Get full text
Article -
812
Augmented Reality for Learning Algorithms: Evaluation of Its Impact on Students’ Emotions Using Artificial Intelligence
Published 2025-07-01“…Augmented reality is an educational technology mainly used in disciplines with a strong physical component, such as architecture or engineering. …”
Get full text
Article -
813
A Comparative Analysis of Machine Learning Algorithms for Classification of Diabetes Utilizing Confusion Matrix Analysis
Published 2024-05-01“…The study determined that three algorithms are very effective at prediction. Mainly, logistic regression and Adaboost had a classification rate above 92%, and the naive bayes algorithm achieved a classification rate above 90%. …”
Get full text
Article -
814
Intra-Net Cognitive Radio Intelligent Utility Maximization using Adaptive PSO-Gradient Algorithm
Published 2020-11-01“… Artificial intelligence now days are mainly dependent on deep learning techniques as it is rapidly growing and capable to outperform other approaches and even human at various problems. …”
Get full text
Article -
815
An improved multi-leader comprehensive learning particle swarm optimisation based on gravitational search algorithm
Published 2021-10-01“…Gravitational Search Algorithm is introduced to preserve the algorithm’s ability to maintain diversity. …”
Get full text
Article -
816
A Fast Rail Profile Point Cloud Matching Algorithm Based on Overlay Weight ICP
Published 2023-10-01“…The factors that affect rail's performance and quality mainly include fractures, abrasion, scratches, wear, etc. …”
Get full text
Article -
817
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network
Published 2014-01-01“…Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. …”
Get full text
Article -
818
Small Target Detection Algorithm for UAV Aerial Images Based on Improved YOLOv7-tiny
Published 2025-05-01“…Comparative experiments are also conducted to assess and analyze the detection performance of the improved algorithm against other algorithms.This study mainly addresses the following aspectsConclusionsThis study mainly addresses and improves the issues of missed and false detections caused by large-scale variations, dense small target distributions, and complex backgrounds in UAV aerial images. …”
Get full text
Article -
819
Estimation of the Ultimate Bearing Capacity of the Rocks via Utilization of the AI-Based Frameworks
Published 2024-12-01“…The approach adopted here is new and solves the problem using KNN combined with two modern nature-inspired optimization frameworks, namely the Honey Badger Algorithm (HBA) and Equilibrium Slime Mould Algorithm (ESMA). …”
Get full text
Article -
820